Zoth RWA Platform Experiences Second Hack in March 2025


zoth-rwa-platform-experiences-second-hack-in-march-2025
Zoth RWA Platform Experiences Second Hack in March 2025

Hack Drains $8.4 Million from Zoth

The Zoth platform suffered a second breach in March, with $8.4 million drained in USD0++. The attackers converted the funds promptly to 4,223 ETH through a proxy contract exploit. The incident has intensified scrutiny on Zoth’s security practices.

Zoth reported the breach via its
official Twitter account, confirming a
security breach and ongoing investigations. Despite promises of transparency,
CEO Pritam Dutta and CTO Koushik Bhargav have not issued personal statements
addressing users directly.

“We are aware that our system has experienced a security breach. We are working closely with our partners to mitigate the impact and fully resolve the issue. A detailed report with a clear view will be shared once the investigation is complete.”

ZOT Token Drops Over 21% After Exploit

The latest exploit directly affected Zoth’s markets, causing its token ZOT to plummet by over 21.9%. Community sentiment has shifted towards increased concern, with users demanding comprehensive audits of Zoth’s security measures.

Financial repercussions are evident as Bitcoin remains stable, Ethereum rises slightly by 1.09%, and Zoth’s standing continues to suffer. Market participants call for improved transparency and upgrades to prevent similar breaches.

Second Breach in March Raises Security Alarms

This incident marks the second breach for Zoth this month after a previous $285,000 liquidity pool exploit. The recurrence of issues has escalated demands from the community for enhanced security measures.

Hakan Unal of Cyvers suggests implementing multisig upgrades, timelocks, and real-time alerts to fortify against such attacks. Future actions may include more stringent
security protocols to safeguard user funds.

“Unlike typical exploits, this method bypassed security mechanisms and gave full control over user funds instantly. This type of attack could be prevented by implementing multisig contract upgrades to prevent single-point failures, adding timelocks on upgrades to allow monitoring, and placing real-time alerts for admin role changes.”

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *